What Attackers Are Doing With Them
When an organization's credentials are leaked, the immediate consequences are rarely visible—but…
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
Aug 02, 2025Ravie LakshmananThreat Detection / SSH Security Cybersecurity researchers have flagged…
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
Jul 31, 2025Ravie LakshmananPhishing / Threat Intelligence Cybersecurity researchers have disclosed details…
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain
Jul 29, 2025Ravie LakshmananPhishing / Developer Security The maintainers of the Python…
Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads
Jul 28, 2025Ravie LakshmananMalware / Developer Tools In what's the latest instance…
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
Jul 23, 2025Ravie LakshmananWindows Security / Cryptocurrency The Windows banking trojan known…
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure
Jul 21, 2025Ravie LakshmananBrowser Security / Malware The China-linked cyber espionage group…
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
Jul 20, 2025Ravie LakshmananAI Security / Infostealers The financially motivated threat actor…
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged…


